Professional Documents
Culture Documents
UNIT-1
A COMMUNICATIONS MODEL
• The fundamental purpose of a communications system is the exchange of
data between two parties. Figure 1.2b presents one particular example,
which is communication between a workstation and a server over a public
telephone network.
• Another example is the exchange of voice signals between two telephones
over the same network. The key elements of the model are as follows:
• Source. This device generates the data to be transmitted; examples are
telephones and personal computers.
• Transmitter: Usually, the data generated by a source system are not
transmitted directly in the form in which they were generated. Rather, a
transmitter transforms and encodes the information in such a way as to
produce electromagnetic signals that can be transmitted across some sort
of transmission system.
• For example, a modem takes a digital bit stream from an attached device
• such as a personal computer and transforms that bit stream into an analog
signal that can be handled by the telephone network.
• • Transmission system: This can be a single transmission line or a
complex network connecting source and destination.
• • Receiver: The receiver accepts the signal from the transmission system
and converts it into a form that can be handled by the destination device.
For example, a modem will accept an analog signal coming from a network
or transmission line and convert it into a digital bit stream.
• • Destination: Takes the incoming data from the receiver.
Network Criteria
• 2. Sender: The sender is the device that sends the data message. It can be a
computer, workstation, telephone handset, video camera, and so on.
• 3. Receiver: The receiver is the device that receives the message. It can be
a computer, workstation, telephone handset, television, and so on.
• Topology defines the structure of the network of how all the components
are interconnected to each other. There are two types of topology: physical
and logical topology.
• Physical topology is the geometric representation of all the nodes in a
network.
BUS TOPOLOGY
RING TOPOLOGY
Guided Media
This kind of transmission media is also known as wired otherwise bounded media. In
this type, the signals can be transmitted directly & restricted in a thin path through
physical links. The main features of guided media mainly include secure, high-speed,
and used in small distances. This kind of media is classified into three types which are
discussed below.
Unguided Media
It is also known as unbounded otherwise wireless transmission media. It doesn’t
require any physical medium to transmit electromagnetic signals. The main features of
this media are less secure, the signal can be transmitted through air, and applicable for
large distances.
• Twisted Pair Cable
• One of the more commonly used transmission media for network cabling and
telephone systems is twisted-pair cable. Twisted-pair cable consists of one or more
twisted-pair wires bundled together (Figure 8-24). Each twisted-pair wire consists
of two separate insulated copper wires that are twisted together. The wires are
twisted together to reduce noise. Noise is an electri- cal disturbance that can
degrade communications
• UTP (Unshielded Twisted Pair)
• This UTP cable has the capacity to block interference. It doesn’t depend on a
physical guard and used in telephonic applications. The advantage of UTP is a low
cost, very simple to install, and high speed. The disadvantages of UTP is liable to
exterior interference, transmits in fewer distances, and less capacity.
• STP (Shielded Twisted Pair)
• STP cable includes a particular jacket for blocking outside interference. It is used in
rapid data rate Ethernet, in voice & data channels of telephone lines.
• The main advantages of STP cable mainly include good speed, removes crosstalk.
The main disadvantages are hard to manufacture as well as install, It is expensive
and bulky also
Advantages of Twisted-Pair Cable
It is cheap and easy to install.
Greater transmission rate.
Capacity is high.
Disadvantages of Twisted-Pair Cable
Higher attenuation rate.
Shielded cable is costlier than coaxial and unshielded cable.
Useful in a short distance (due to attenuation).
• Coaxial Cable
• This cable contains an external plastic cover and it includes two parallel conductors
where each conductor includes a separate protection cover. This cable is used to
transmit data in two modes like baseband mode as well as broadband mode. This
cable is widely used in cable TVs & analog TV networks.
• The advantages of the coaxial cable include high bandwidth, noise immunity is
good, low cost and simple to install. The disadvantage of this cable is, the failure of
cable can disturb the whole network
• Coaxial cable, often referred to as coax (pronounced KO-ax), consists of a single
copper wire surrounded by at least three layers: (1) an insulating material, (2) a
woven or braided metal, and (3) a plastic outer coating (Figure 8-25).
3.47
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
To be transmitted, data must be
transformed to electromagnetic signals.
3.48
3-1 ANALOG AND DIGITAL
Data can be analog or digital. The term analog data refers to information that is continuous;
digital data refers to information that has discrete states. Analog data take on continuous
values. Digital data take on discrete values.
3.49
Note
3.50
Note
3.51
Figure 3.1 Comparison of analog and digital signals
3.52
Figure 3.2 A sine wave
3.53
Note
3.54
Example 3.1
The power in your house can be represented by a sine wave with a peak amplitude of 155
to 170 V. However, it is common knowledge that the voltage of the power in U.S. homes is
110 to 120 V. This discrepancy is due to the fact that these are root mean square (rms)
values. The signal is squared and then the average amplitude is calculated. The peak value
is equal to 2½ × rms value.
3.55
Figure 3.3 Two signals with the same phase and frequency,
but different amplitudes
3.56
Example 3.2
The voltage of a battery is a constant; this constant value can be considered a sine wave,
as we will see later. For example, the peak value of an AA battery is normally
1.5 V.
3.57
Note
3.58
Figure 3.4 Two signals with the same amplitude and phase,
but different frequencies
3.59
Table 3.1 Units of period and frequency
3.60
Example 3.3
The power we use at home has a frequency of 60 Hz. The period of this sine wave can be
determined as follows:
3.61
Example 3.4
Solution
From Table 3.1 we find the equivalents of 1 ms (1 ms is 10 −3 s) and 1 s (1 s is 106 μs). We
make the following substitutions:.
3.62
Example 3.5
Solution
First we change 100 ms to seconds, and then we calculate the frequency from the period
(1 Hz = 10−3 kHz).
3.63
Note
3.65
Note
3.66
Figure 3.5 Three sine waves with the same amplitude and frequency,
but different phases
3.67
Example 3.6
A sine wave is offset 1/6 cycle with respect to time 0. What is its phase in degrees and
radians?
Solution
We know that 1 complete cycle is 360°. Therefore, 1/6 cycle is
3.68
Figure 3.6 Wavelength and period
3.69
Figure 3.7 The time-domain and frequency-domain plots of a sine wave
3.70
Example 3.7
The frequency domain is more compact and useful when we are dealing with more
than one sine wave. For example, Figure 3.8 shows three sine waves, each with
different amplitude and frequency. All can be represented by three spikes in the
frequency domain.
3.71
Figure 3.8 The time domain and frequency domain of three sine waves
3.72
Note
3.73
Note
3.74
Note
3.75
Example 3.8
Figure 3.9 shows a periodic composite signal with frequency f. This type of signal is not
typical of those found in data communications. We can consider it to be three alarm
systems, each with a different frequency. The analysis of this signal can give us a good
understanding of how to decompose signals.
3.76
Figure 3.9 A composite periodic signal
3.77
Figure 3.10 Decomposition of a composite periodic signal in the time and
frequency domains
3.78
3-3 DIGITAL SIGNALS
Bit Rate
Bit Length
Digital Signal as a Composite Analog Signal
Application Layer
3.79
Figure 3.16 Two digital signals: one with two signal levels and the other
with four signal levels
3.80
Note
exponential andfunctions.
logarithmic functions.
3.81
Example 3.16
A digital signal has eight levels. How many bits are needed per level? We calculate the
number of bits from the formula
3.82
Example 3.17
A digital signal has nine levels. How many bits are needed per level? We calculate the
number of bits by using the formula. Each signal level is represented by 3.17 bits.
However, this answer is not realistic. The number of bits sent per level needs to be an
integer as well as a power of 2. For this example, 4 bits can represent one level.
3.83
Example 3.18
Assume we need to download text documents at the rate of 100 pages per minute. What
is the required bit rate of the channel?
Solution
A page is an average of 24 lines with 80 characters in each line. If we assume that one
character requires 8 bits, the bit rate is
3.84
Example 3.19
Solution
The bit rate can be calculated as
3.85
Example 3.20
Solution
HDTV uses digital signals to broadcast high quality video signals. The HDTV screen is
normally a ratio of 16 : 9. There are 1920 by 1080 pixels per screen, and the screen is
renewed 30 times per second. Twenty-four bits represents one color pixel.
3.86
Figure 3.17 The time and frequency domains of periodic and nonperiodic
digital signals
3.87
Figure 3.18 Baseband transmission
3.88
Note
3.89
Figure 3.19 Bandwidths of two low-pass channels
3.90
Figure 3.20 Baseband transmission using a dedicated medium
3.91
Note
3.92
Example 3.21
An example of a dedicated channel where the entire bandwidth of the medium is used as
one single channel is a LAN. Almost every wired LAN today uses a dedicated channel for
two stations communicating with each other. In a bus topology LAN with multipoint
connections, only two stations can communicate with each other at each moment in time
(timesharing); the other stations need to refrain from sending data. In a star topology
LAN, the entire channel between each station and the hub is used for communication
between these two entities. We study LANs in Chapter 14.
3.93
Figure 3.21 Rough approximation of a digital signal using the first harmonic
for worst case
3.94
Figure 3.22 Simulating a digital signal with first three harmonics
3.95
Note
more bandwidth.
3.96
Table 3.2 Bandwidth requirements
3.97
3-6 PERFORMANCE
One important issue in networking is the performance of the network—how good is it?
We discuss quality of service, an overall measurement of network performance, in greater
detail in Chapter 24. In this section, we introduce terms that we need for future chapters.
Bandwidth
Throughput
Latency (Delay)
Bandwidth-Delay Product
3.98
Note
3.99
Example 3.42
The bandwidth of a subscriber line is 4 kHz for voice or data. The bandwidth of this line
for data transmission
can be up to 56,000 bps using a sophisticated modem to change the digital signal to
analog.
3.100
Example 3.43
If the telephone company improves the quality of the line and increases the bandwidth to
8 kHz, we can send 112,000 bps by using the same technology as mentioned in Example
3.42.
3.101
Example 3.44
A network with bandwidth of 10 Mbps can pass only an average of 12,000 frames per
minute with each frame carrying an average of 10,000 bits. What is the throughput of this
network?
Solution
We can calculate the throughput as
3.102
Example 3.45
What is the propagation time if the distance between the two points is 12,000 km?
Assume the propagation speed to be 2.4 × 108 m/s in cable.
Solution
We can calculate the propagation time as
The example shows that a bit can go over the Atlantic Ocean in only 50 ms if there is a
direct cable between the source and the destination.
3.103
Example 3.46
What are the propagation time and the transmission time for a 2.5-kbyte message (an e-
mail) if the bandwidth of the network is 1 Gbps? Assume that the distance between the
sender and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission time as shown on the next slide:
3.104
Example 3.46 (continued)
Note that in this case, because the message is short and the bandwidth is high, the
dominant factor is the propagation time, not the transmission time. The transmission
time can be ignored.
3.105
Example 3.47
What are the propagation time and the transmission time for a 5-Mbyte message (an
image) if the bandwidth of the network is 1 Mbps? Assume that the distance between the
sender and the receiver is 12,000 km and that light travels at 2.4 × 108 m/s.
Solution
We can calculate the propagation and transmission times as shown on the next slide.
3.106
Example 3.47 (continued)
Note that in this case, because the message is very long and the bandwidth is not very
high, the dominant factor is the transmission time, not the propagation time. The
propagation time can be ignored.
3.107
Figure 3.31 Filling the link with bits for case 1
3.108
Example 3.48
We can think about the link between two points as a pipe. The cross section of the pipe
represents the bandwidth, and the length of the pipe represents the delay. We can say
the volume of the pipe defines the bandwidth-delay product, as shown in Figure 3.33.
3.109
Figure 3.32 Filling the link with bits in case 2
3.110
Note
3.111
Figure 3.33 Concept of bandwidth-delay product
3.112
Data Transmission types
• Serial Transmission
• Data is sent bit by bit from one computer to another in two directions.
Each bit has a clock pulse rate. Eight bits are transmitted at a time, with a
start and stop bit known as a parity bit, which is 0 and 1, respectively.
Data cables are used when transmitting data over a longer distance. The
data cable has D-shaped 9 pin cable that connects the data in series.
• Categories of Serial Transmission
• Asynchronous transmission – an extra bit is added to each byte to alert
the receiver to the arrival of new data. 0 is used as a start bit, while 1 used
as a stop bit.
• Synchronous transmission – no extra bit is added to each byte. Data is
transferred in batches, each of which contains multiple bytes.
• Parallel Transmission
• Several bits are transmitted simultaneously with one clock pulse
rate. It transmits quickly as it utilises several input and output lines
for sending the data.
• It uses a 25-pin port with 17 signal lines and 8 ground lines. The 17
signal lines are divided as
• 4 lines – initiate handshaking
• 5 lines – communicate and notify errors
• 8 lines – transfer data
• Examples
• One example of serial mode transmission is a connection established
between a computer and a modem using the RS-232 protocol. An RS-232
cable can accommodate 25 wires, but only two of these wires are for data
transmission; the rest are designated for overhead control signaling. The
two data wires run using simple serial transmission in either direction.
• An example of parallel mode transmission is a connection established
between a computer and a printer. Most printers are within 6 meters (about
20 feet) from the transmitting computer, and the slight cost for extra wires
is offset by the added speed gained through parallel transmission of data.
Types of Computer Network
2.122
Figure 2.1 Tasks involved in sending a letter
2.123
2-2 THE OSI MODEL
Established in 1947, the International Standards
Organization (ISO) is a multinational body dedicated to
worldwide agreement on international standards. An ISO
standard that covers all aspects of network
communications is the Open Systems Interconnection (OSI)
model. It was first introduced in the late 1970s.
2.125
Figure 2.2 Seven layers of the OSI model
2.126
Figure 2.3 The interaction between layers in the OSI model
2.127
Figure 2.4 An exchange using the OSI model
2.128
2-3 LAYERS IN THE OSI MODEL
2.129
The physical layer is responsible for movements of
individual bits from one hop (node) to the next.
Medium
The transmission medium and interface between the devices and the medium.
Line Configuration
The Physical layer connects devices to the medium.
Bits
The data is in the form of stream of bits, which must be encoded into signals
for transmission.
Topology
The connection of devices to make a network is called a Topology. It includes
mesh, ring, bus, and star topology.
2.130
Figure 2.5 Physical layer
2.131
The data link layer is responsible for moving
frames from one hop (node) to the next.
Frames
The stream of bits are divided into data units called frames.
Physical Address
A header is added to the frame for defining the physical address of the sender or receiver of
the frame. This is done only if the frames are to be distributed to different systems in the same
network.
Error Control
To prevent duplication of frames, the Data Link Layer use Error Control mechanism. This is
required to detect and retransmit frames that gets damaged or lost in transit. Error Control
adds a trailer to the end of the frame.
Flow Control
To prevent chaotic traffic at the receiver dise, the data link layer has a mechanism known as
Flow Control. This is required only if the data receiving rate of receiver is less than the rate at
which the data is produced.
2.132
Figure 2.6 Data link layer
2.133
Figure 2.7 Hop-to-hop delivery
2.134
The network layer is responsible for the
delivery of individual packets from
the source host to the destination host.
Routing
The Network Layer route the packets to the final destination.
Logical Address
This layer adds a header the packet. A packet crossing network boundaries is
provided with an addressing system. The system helps in distinguishing source and
destination.
2.135
Figure 2.8 Network layer
2.136
Figure 2.9 Source-to-destination delivery
2.137
The transport layer is responsible for the delivery
of a message from one process to another.
Service-point address
The Layer includes a header with the address called the port address i.e. service-point
address. The layer transmits the complete message to the correct process.
Segments
Message is divided into segments. Each of these segments contains a sequence number.
The Layer reassemble the message correctly upon arrival. This is to recognize and replace
the packets lost in transmission.
Connection Control
The layer includes,
2.139
Figure 2.11 Reliable process-to-process delivery of a message
2.140
The session layer is responsible for dialog
control and synchronization.
2.141
Figure 2.12 Session layer
2.142
The presentation layer is responsible for translation,
compression, and encryption.
Translation
Change the Information like characters and numbers to stream of bits before
transmission.
Encryption/ Decryption
When the sender transforms original information to another form, it is
called Encryption. This information is sent on the network.
Under Decryption, the updated information is transformed to the actual message.
Compression
Reduce the number of bits with Compression. Useful in transmitting audio, video, etc
over the network
2.143
Figure 2.13 Presentation layer
2.144
The application layer is responsible for
providing services to the user.
2.145
Figure 2.14 Application layer
2.146
Figure 2.15 Summary of layers
2.147
2-4 TCP/IP PROTOCOL SUITE
2.151
2-5 ADDRESSING
2.152
Figure 2.17 Addresses in TCP/IP
2.153
Figure 2.18 Relationship of layers and addresses in TCP/IP
2.154
Example 2.1
2.155
Figure 2.19 Physical addresses
2.156
Example 2.2
07:01:02:01:2C:4B
2.157
Example 2.3
2.158
Figure 2.20 IP addresses
2.159
Example 2.4
2.160
Figure 2.21 Port addresses
2.161
Note
2.162
Example 2.5
753
2.163
Note
2.164
• TCP/IP model
• The TCP/IP model was developed prior to the OSI model.
• The TCP/IP model is not exactly similar to the OSI model.
• The TCP/IP model consists of five layers: the application layer, transport
layer, network layer, data link layer and physical layer.
• The first four layers provide physical standards, network interface,
internetworking, and transport functions that correspond to the first four
layers of the OSI model and these four layers are represented in TCP/IP
model by a single layer called the application layer.
• TCP/IP is a hierarchical protocol made up of interactive modules, and each
of them provides specific functionality.
• Network layer
• The network layer is where data is addressed, packaged, and routed among
networks.
• Several important Internet protocols operate at the network layer:
• »»Internet Protocol (IP): A routable protocol that uses IP addresses to deliver
• packets to network devices. IP is an intentionally unreliable protocol, so it
• doesn’t guarantee delivery of information.
• »»Address Resolution Protocol (ARP): Resolves IP addresses to hardware
• Media Access Control (MAC) addresses, which uniquely identify hardware
• devices.
• »»Internet Control Message Protocol (ICMP): Sends and receives diagnostic
• messages. ICMP is the basis of the ubiquitous ping command.
• »»Internet Group Management Protocol (IGMP): Used to multicast messages
• to multiple IP addresses at once.
• Transport layer
• The transport layer is where sessions are established and data packets are
• exchanged between hosts. Two core protocols are found at this layer:
• »»Transmission Control Protocol (TCP): Provides reliable connection-
oriented
• transmission between two hosts. TCP establishes a session between hosts,
• and then ensures delivery of packets between the hosts.
• »»User Datagram Protocol (UDP): Provides connectionless, unreliable,
• one-to-one or one-to-many delivery.
• Application layer
• The application layer of the TCP/IP model corresponds to the session, presentation,
• and application layers of the OSI Reference Model. A few of the most popular
• application layer protocols are
• »»HyperText Transfer Protocol (HTTP): The core protocol of the
• World Wide Web.
• »»File Transfer Protocol (FTP): A protocol that enables a client to send and
• receive complete files from a server.
• »»Telnet: The protocol that lets you connect to another computer on the
• Internet in a terminal emulation mode.
• »»Simple Mail Transfer Protocol (SMTP): One of several key protocols that
are
• used to provide email services.
• »»Domain Name System (DNS): The protocol that allows you to refer to other
• host computers by using names rather than numbers.
OSI(Open Systems Interconnection) Reference Model
• The OSI model breaks the various aspects of a computer network into
seven distinct layers. These layers are kind of like the layers of an onion:
Each successive layer envelops the layer beneath it, hiding its details from
the levels above.
• The OSI model is a framework into which the various networking
standards can fit. The OSI model specifies what aspects of a network’s
operation can be addressed by various network standards.
• Interfaces Between Layers
• The passing of the data and network information down through the layers
of the sending device and back up through the layers of the receiving
device is made possible by an interface between each pair of adjacent
layers.
• Peer-to-Peer Processes
• At the physical layer, communication is direct: In Figure 2.3, device A sends
a stream of bits to device B (through intermediate nodes). At the higher
layers, however, communication must move down through the layers on
device A, over to device B, and then back up through the layers. Each layer
in the sending device adds its own information to the message it receives
from the layer just above it and passes the whole package to the layer just
below it.
Switching techniques
• In large networks, there can be multiple paths from sender to receiver. The
switching technique will decide the best route for data transmission.
• Switching technique is used to connect the systems for making one-to-one
communication.
• Circuit Switching
• Circuit switching is a switching technique that establishes a dedicated path
between sender and receiver.
• In the Circuit Switching Technique, once the connection is established then the
dedicated path will remain to exist until the connection is terminated.
• Circuit switching in a network operates in a similar way as the telephone works.
• A complete end-to-end path must exist before the communication takes place.
• In case of circuit switching technique, when any user wants to send the data,
voice, video, a request signal is sent to the receiver then the receiver sends back
the acknowledgment to ensure the availability of the dedicated path. After
receiving the acknowledgment, dedicated path transfers the data.
• Circuit switching is used in public telephone network. It is used for voice
transmission.
• Fixed data can be transferred at a time in circuit switching technology.
• Communication through circuit switching has 3 phases:
• Circuit establishment
• Data transfer
• Circuit Disconnect
Circuit Switching can use either of the two technologies:
Space Division Switches:
Space Division Switching is a circuit switching technology in which a single transmission path is
accomplished in a switch by using a physically separate set of crosspoints.
Space Division Switching can be achieved by using crossbar switch. A crossbar switch is a metallic
crosspoint or semiconductor gate that can be enabled or disabled by a control unit.
The Crossbar switch is made by using the semiconductor. For example, Xilinx crossbar switch
using FPGAs.
Space Division Switching has high speed, high capacity, and nonblocking switches.
• Space Division Switches can be categorized in two ways:
• Crossbar Switch
• Multistage Switch
• Crossbar Switch
• The Crossbar switch is a switch that has n input lines and n output lines.
The crossbar switch has n2 intersection points known as crosspoints.
• Disadvantage of Crossbar switch:
• The number of crosspoints increases as the number of stations is
increased. Therefore, it becomes very expensive for a large switch. The
solution to this is to use a multistage switch.
• Multistage Switch
• Multistage Switch is made by splitting the crossbar switch into the
smaller units and then interconnecting them.
• It reduces the number of crosspoints.
• If one path fails, then there will be an availability of another path
• Advantages Of Circuit Switching:
• In the case of Circuit Switching technique, the communication
channel is dedicated.
• It has fixed bandwidth.
• Disadvantages Of Circuit Switching:
• Once the dedicated path is established, the only delay occurs in the
speed of data transmission.
• It takes a long time to establish a connection approx 10 seconds
during which no data can be transmitted.
• It is more expensive than other switching techniques as a dedicated
path is required for each connection.
• It is inefficient to use because once the path is established and no data
is transferred, then the capacity of the path is wasted.
• In this case, the connection is dedicated therefore no other data can be
transferred even if the channel is free.
• Message Switching
• Message Switching is a switching technique in which a message is
transferred as a complete unit and routed through intermediate nodes
at which it is stored and forwarded.
• In Message Switching technique, there is no establishment of a
dedicated path between the sender and receiver.
• The destination address is appended to the message. Message
Switching provides a dynamic routing as the message is routed
through the intermediate nodes based on the information available in
the message.
• Message switches are programmed in such a way so that they can
provide the most efficient routes.
• Each and every node stores the entire message and then forward it to
the next node. This type of network is known as store and forward
network.
• Message switching treats each message as an independent entity.
Advantages Of Message Switching
Data channels are shared among the communicating devices that improve the efficiency of
using available bandwidth.
Traffic congestion can be reduced because the message is temporarily stored in the nodes.
Message priority can be used to manage the network.
The size of the message which is sent over the network can be varied. Therefore, it
supports the data of unlimited size.
Disadvantages Of Message Switching
The message switches must be equipped with sufficient storage to enable them to store
the messages until the message is forwarded.
The Long delay can occur due to the storing and forwarding facility provided by the
message switching technique.
• Packet Switching
• The packet switching is a switching technique in which the message is
sent in one go, but it is divided into smaller pieces, and they are sent
individually.
• The message splits into smaller pieces known as packets and packets
are given a unique number to identify their order at the receiving end.
• Every packet contains some information in its headers such as source
address, destination address and sequence number.
• Packets will travel across the network, taking the shortest path as
possible.
• All the packets are reassembled at the receiving end in correct order.
• If any packet is missing or corrupted, then the message will be sent to
resend the message.
• If the correct order of the packets is reached, then the
acknowledgment message will be sent.
Approaches Of Packet Switching:
There are two approaches to Packet Switching:
Datagram Packet switching:
It is a packet switching technology in which packet is known as a datagram, is considered as an
independent entity. Each packet contains the information about the destination and switch
uses this information to forward the packet to the correct destination.
The packets are reassembled at the receiving end in correct order.
In Datagram Packet Switching technique, the path is not fixed.
Intermediate nodes take the routing decisions to forward the packets.
Datagram Packet Switching is also known as connectionless switching.
Virtual Circuit Switching
Virtual Circuit Switching is also known as connection-oriented switching.
In the case of Virtual circuit switching, a preplanned route is established before the messages
are sent.
Call request and call accept packets are used to establish the connection between sender and
receiver.
In this case, the path is fixed for the duration of a logical connection.
In the above diagram, A and B are the sender and receiver respectively. 1 and 2 are the
nodes.
Call request and call accept packets are used to establish a connection between the sender
and receiver.
When a route is established, data will be transferred.
After transmission of data, an acknowledgment signal is sent by the receiver that the
message has been received.
If the user wants to terminate the connection, a clear signal is sent for the termination.
• Advantages Of Packet Switching:
• Cost-effective: In packet switching technique, switching devices do not
require massive secondary storage to store the packets, so cost is
minimized to some extent. Therefore, we can say that the packet switching
technique is a cost-effective technique.
• Reliable: If any node is busy, then the packets can be rerouted. This
ensures that the Packet Switching technique provides reliable
communication.
• Efficient: Packet Switching is an efficient technique. It does not require
any established path prior to the transmission, and many users can use the
same communication channel simultaneously, hence makes use of
available bandwidth very efficiently.
• Disadvantages Of Packet Switching:
• Packet Switching technique cannot be implemented in those applications
that require low delay and high-quality services.
• The protocols used in a packet switching technique are very complex and
requires high implementation cost.
• If the network is overloaded or corrupted, then it requires retransmission of
lost packets. It can also lead to the loss of critical information if errors are
nor recovered.
Multiplexing
• Why Multiplexing?
• The transmission medium is used to send the signal from sender to
receiver. The medium can only have one signal at a time.
• If there are multiple signals to share one medium, then the medium must be
divided in such a way that each signal is given some portion of the
available bandwidth. For example: If there are 10 signals and bandwidth of
medium is100 units, then the 10 unit is shared by each signal.
• When multiple signals share the common medium, there is a possibility of
collision. Multiplexing concept is used to avoid such collision.
• Transmission services are very expensive.
Frequency-division Multiplexing (FDM)
It is an analog technique.
Frequency Division Multiplexing is a technique in which the available bandwidth of a
single transmission medium is subdivided into several channels.
Advantages Of FDM:
FDM is used for analog signals.
FDM process is very simple and easy modulation.
A Large number of signals can be sent through an FDM simultaneously.
It does not require any synchronization between sender and receiver.
Disadvantages Of FDM:
FDM technique is used only when low-speed channels are required.
It suffers the problem of crosstalk.
A Large number of modulators are required.
It requires a high bandwidth channel.
Applications Of FDM:
FDM is commonly used in TV networks.
It is used in FM and AM broadcasting. Each FM radio station has different frequencies, and
they are multiplexed to form a composite signal. The multiplexed signal is transmitted in
the air.
• Time Division Multiplexing
• It is a digital technique.
• In Frequency Division Multiplexing Technique, all signals operate at the same time
with different frequency, but in case of Time Division Multiplexing technique, all
signals operate at the same frequency with different time.
• In Time Division Multiplexing technique, the total time available in the channel
is distributed among different users. Therefore, each user is allocated with different
time interval known as a Time slot at which data is to be transmitted by the sender.
• A user takes control of the channel for a fixed amount of time.
• In Time Division Multiplexing technique, data is not transmitted simultaneously
rather the data is transmitted one-by-one.
• In TDM, the signal is transmitted in the form of frames. Frames contain a cycle of
time slots in which each frame contains one or more slots dedicated to each user.
• It can be used to multiplex both digital and analog signals but mainly used to
multiplex digital signals.
• There are two types of TDM:
• Synchronous TDM
• Asynchronous TDM
Synchronous TDM
Asynchronous TDM
Concept Of Asynchronous TDM